Performance Analysis of Some Batch Verification Methods of Digital Signatures
In this paper, we compare three methods in detecting invalid signatures in batch verification. The first method, randomly select test, randomly chooses a half of signatures to verify in a batch. The second method is the small exponent test which is widely used. The third method, randomly numbering t...
Saved in:
| Published in | 2017 12th Asia Joint Conference on Information Security (AsiaJCIS) pp. 10 - 14 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.08.2017
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/AsiaJCIS.2017.14 |
Cover
| Abstract | In this paper, we compare three methods in detecting invalid signatures in batch verification. The first method, randomly select test, randomly chooses a half of signatures to verify in a batch. The second method is the small exponent test which is widely used. The third method, randomly numbering test, is a simplified method of the matrix-detection algorithm. The randomly numbering test randomizes the order of the signatures and verifies the signatures in log k+1 batches where k is the number of signatures. We simulate each method and analyze the efficiency of the methods. As a result, randomly numbering test is more efficient than small exponent test when the number of signatures in a batch verification is large. |
|---|---|
| AbstractList | In this paper, we compare three methods in detecting invalid signatures in batch verification. The first method, randomly select test, randomly chooses a half of signatures to verify in a batch. The second method is the small exponent test which is widely used. The third method, randomly numbering test, is a simplified method of the matrix-detection algorithm. The randomly numbering test randomizes the order of the signatures and verifies the signatures in log k+1 batches where k is the number of signatures. We simulate each method and analyze the efficiency of the methods. As a result, randomly numbering test is more efficient than small exponent test when the number of signatures in a batch verification is large. |
| Author | Yu-Shen Lin Guan, D. J. Chung, I. C. Zhuang, E. S. |
| Author_xml | – sequence: 1 givenname: D. J. surname: Guan fullname: Guan, D. J. email: guan@cse.nsysu.edu.tw organization: Dept. of Comput. Sci. & Eng., Nat. Sun Yat-sen Univ., Kaohsiung, Taiwan – sequence: 2 givenname: E. S. surname: Zhuang fullname: Zhuang, E. S. email: zhuanges@isl.cse.nsysu.edu.tw organization: Dept. of Comput. Sci. & Eng., Nat. Sun Yat-sen Univ., Kaohsiung, Taiwan – sequence: 3 givenname: I. C. surname: Chung fullname: Chung, I. C. email: zhongyj@isl.cse.nsysu.edu.tw organization: Dept. of Comput. Sci. & Eng., Nat. Sun Yat-sen Univ., Kaohsiung, Taiwan – sequence: 4 surname: Yu-Shen Lin fullname: Yu-Shen Lin email: linys@isl.cse.nsysu.edu.tw organization: Dept. of Comput. Sci. & Eng., Nat. Sun Yat-sen Univ., Kaohsiung, Taiwan |
| BookMark | eNotjMtOwzAQAI0EByi9I3HxDyR44zhZH0N4FbUCKcC12jib1lJjoyQc-vcg4DQaaTQX4jTEwEJcgUoBlL2pJk_P9apJMwVlCvmJWNoSwWgsMtCZORebVx77OA4UHMsq0OE4-UnGXjZxYHlLs9vLDx597x3NPga54Xkfu9_kzu_8TAfZ-F2g-Wvk6VKc9XSYePnPhXh_uH-rn5L1y-OqrtaJh9LMCQCSBYdFq_KWStdmBSODNrb7ceSSeqvImIw7x4idxY6sA0INLaAp9UJc_309M28_Rz_QeNyiygqlc_0Np8lMBA |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/AsiaJCIS.2017.14 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781538621325 1538621320 |
| EndPage | 14 |
| ExternalDocumentID | 8026034 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i175t-118a91c86b04ba7cb26e8e1359d4ba8e7af90a552edce88d98da9c1a831b18573 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:36:45 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-118a91c86b04ba7cb26e8e1359d4ba8e7af90a552edce88d98da9c1a831b18573 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_8026034 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-Aug. |
| PublicationDateYYYYMMDD | 2017-08-01 |
| PublicationDate_xml | – month: 08 year: 2017 text: 2017-Aug. |
| PublicationDecade | 2010 |
| PublicationTitle | 2017 12th Asia Joint Conference on Information Security (AsiaJCIS) |
| PublicationTitleAbbrev | ASIAJCIS |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.6476554 |
| Snippet | In this paper, we compare three methods in detecting invalid signatures in batch verification. The first method, randomly select test, randomly chooses a half... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 10 |
| SubjectTerms | Asia Digital signatures Error analysis Information security Performance analysis |
| Title | Performance Analysis of Some Batch Verification Methods of Digital Signatures |
| URI | https://ieeexplore.ieee.org/document/8026034 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5tT55UWvFNDh7d7T6ym-So1VILK4Va6a3kMamL2C12e_HXm-z2IeLBWxJCEpJhhiTf9w1CN0oCIzzUnpLWgq33k56QOvIiyYIYSASxcATn7DkdTMhwmkwb6HbHhQGACnwGvitWf_m6UGv3VNZlTgArJk3UpCytuVrbn8eAd-9WuRj2nsYOr0V9R8v5kS-lChf9Q5RtJ6pRIu_-upS--vqlwfjflRyhzp6Yh0e7kHOMGrBoo2y0B__jrcgILgweFx-A762vfcOv1tDM5nkOZ1XW6KrLQz53WUPwOJ_XEp-rDpr0H196A2-TJcHLbegvPXtDEDxULJUBkYIqGaXAIIwTrm2dARWGByJJIof3ZExzpgVXoWBxKJ0QVHyCWotiAacIG6OBaCZBGkqY4UxxakfQiaGB4UadobbbitmyFsKYbXbh_O_mC3TgTqJGy12iVvm5hisbwUt5XR3dN6UeoLw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG4QD3pSA8a3PXh0l3102faoKAFkCQlgvJE-prgxskaWi7_edpeHMR68tU3TNu1kJm2_7xuEbqQASpivHCmMBRvvJxwuVOAEgnohkABCbgnOyaDZmZDeS_RSQbcbLgwAFOAzcG2x-MtXmVzap7IGtQJYIdlBuxEhJCrZWuu_R4817hYp77W6I4vYil1LzPmRMaUIGO0DlKynKnEib-4yF678-qXC-N-1HKL6lpqHh5ugc4QqMK-hZLiF_-O1zAjONB5l74Dvjbd9xc_G1PTqgQ4nRd7oostDOrN5Q_AonZUin4s6mrQfx62Os8qT4KQm-OeOuSNw5kvaFB4RPJYiaAIFP4yYMnUKMdfM41EUWMQnpYpRxZn0OQ19YaWgwmNUnWdzOEFYawVEUQFCx4RqRiWLzQgq0rGnmZanqGa3YvpRSmFMV7tw9nfzNdrrjJP-tN8dPJ2jfXsqJXbuAlXzzyVcmniei6viGL8BPCmkCQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+12th+Asia+Joint+Conference+on+Information+Security+%28AsiaJCIS%29&rft.atitle=Performance+Analysis+of+Some+Batch+Verification+Methods+of+Digital+Signatures&rft.au=Guan%2C+D.+J.&rft.au=Zhuang%2C+E.+S.&rft.au=Chung%2C+I.+C.&rft.au=Yu-Shen+Lin&rft.date=2017-08-01&rft.pub=IEEE&rft.spage=10&rft.epage=14&rft_id=info:doi/10.1109%2FAsiaJCIS.2017.14&rft.externalDocID=8026034 |